Sciweavers

1551 search results - page 85 / 311
» Privacy-Preserving Network Aggregation
Sort
View
ICCCN
2008
IEEE
14 years 4 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf
TDSC
2010
102views more  TDSC 2010»
13 years 8 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia
INFOCOM
2003
IEEE
14 years 3 months ago
Big-Bang Simulation for embedding network distances in Euclidean space
— Embedding of a graph metric in Euclidean space efficiently and accurately is an important problem in general with applications in topology aggregation, closest mirror selectio...
Yuval Shavitt, Tomer Tankel
CCS
2010
ACM
13 years 10 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
NGC
2001
Springer
157views Communications» more  NGC 2001»
14 years 2 months ago
Aggregated Multicast with Inter-Group Tree Sharing
IP multicast suffers from scalability problems for large numbers of multicast groups, since each router keeps forwarding state proportional to the number of multicast tree passing ...
Aiguo Fei, Jun-Hong Cui, Mario Gerla, Michalis Fal...